Emil Tan

We will be looking two trusted third party (TTP) protocols – the Needham-Schroeder protocol and Kerberos. There are many scenarios in the world of computing that we exercise trust via a TTP. For Read More